So, to summarize, are you saying that the security of the Apple system is practically faultless and only I personally can breach its security, not some hackers through phishing sites?
Compared to most systems over the years, yes, macOS and iOS are practically bulletproof.
There are of course caveats to that statement. For both, the main flaw is the user. The only way to make any OS truly invulnerable is to only allow the user to never write a single thing to the system. No software, no personal files, nothing. That would even include the ability to enter info to purchase things online since any access is a possible way to exploit the system or the user. But then it would only a reference tool you can't get anything done on.
Google is already attempting this with their Chromebooks. There is no user accessible OS. The interface is a web browser. The system on the device is only the bare bones software necessary to access Google's servers. From there, every single thing you do is remote. Okay, they've taken the user out of the equation, but that doesn't put intrusion to Google's servers out of reach. So there's still a way to get at the user data, but with the added bonus in a successful attempt to get at hundreds or thousands of user personal data all at once instead of one at a time.
Basically, you have to let go of the thinking that is Windows. It's come a long way the past 5 to 10 years, but it's still the most exploitable OS in the world. Microsoft itself is the main reason for that. Large, very large companies with legacy software insist MS not break their 20 - 40 year old custom software. MS complies because that is thousands of seats for just one of many such companies, which translates to millions of dollars in OS and production software upgrades and updates. But that also means apps that still use real memory instead of protected memory are still being coddled by Windows. Legacy 8 and 16 bit software still need to run at least in the MS-DOS prompt window. All of this translates to ancient code that can't be dumped, but is easily exploited.
So, what do you do? It's actually very easy.
- Never, never, ever download anything from P2P, file sharing or pirate sites. That's where all of the really nasty malware is. Such as back doors, ransomware, key loggers and the like jammed into installers for cracked commercial software.
- Only install software obtained legitimately from the vendor's site.
That's really all it takes, other than the usual awareness of scam emails, texts and messages.
And just to clarify an oft repeated misnomer.
Malware is NOT a threat unto itself. A person can't say you may have a virus or other malware when a virus IS malware. They are one and the same.
Malware is simply short for malicious software. That's anything you don't want on your computer. All of these are malware and everything falls under three main categories:
Virus
Trojan
Worm
There are no Mac viruses. Haven't been since the release of OS X 10.0. There's only been one know worm, and that was patched against over a decade ago.
Everything else out there the user can screw their Macs up with all by themselves are Trojans. Which is any software the user must download and install. It can't get there by itself. And that's everything that's been mentioned:
Adware
Key logger
Back door
Ransomware
Etc.
If you have to download and install it, whether you were aware you did it or not, it's a Trojan.